Results 71 to 80 of about 70,985 (214)

Real‐world epilepsy monitoring with ultra‐long‐term subcutaneous electroencephalography: A 15‐month prospective study

open access: yesEpilepsia, EarlyView.
Abstract Objective Novel subcutaneous electroencephalography (sqEEG) systems enable prolonged, near‐continuous cerebral monitoring in real‐world conditions. Nevertheless, the feasibility, acceptability and overall clinical utility of these systems remain unclear. We report on the longest observational study using ultra‐long‐term sqEEG to date.
Pedro F. Viana   +7 more
wiley   +1 more source

Feasibility and Acceptability of the Smarthealth Intervention for Dementia Caregivers. A Qualitative Analysis of a Single‐Group Pilot Study

open access: yesJournal of Advanced Nursing, EarlyView.
ABSTRACT Aim(s) To explore the feasibility and acceptability of acoustic monitoring and real‐time recommendations for stress detection and management (i.e., smarthealth intervention). Design This qualitative study used a framework of acceptability for healthcare interventions.
Eunjung Ko   +9 more
wiley   +1 more source

Implications of cooccurring ADHD for the cognitive behavioural treatment of anxiety in autistic children

open access: yesJournal of Child Psychology and Psychiatry, EarlyView.
Background Childhood mental health conditions commonly cooccur, with potential treatment implications. Autistic children frequently experience anxiety and attention deficit/hyperactivity disorder (ADHD). We investigated the implications of this cooccurrence for Cognitive Behavioural Therapy (CBT), a front‐line treatment for anxiety in autistic children.
Elise Ng‐Cordell   +5 more
wiley   +1 more source

Performance Comparisons of Geographic Routing Protocols in Mobile Ad Hoc Networks

open access: yes, 2015
Geographic routing protocols greatly reduce the requirements of topology storage and provide flexibility in the accommodation of the dynamic behavior of mobile ad hoc networks. This paper presents performance evaluations and comparisons of two geographic
Talarico, Salvatore   +2 more
core   +1 more source

Supporting Internet Access and Quality of Service in Distributed Wireless Ad Hoc Networks [PDF]

open access: yes, 2009
In this era of wireless hysteria, with continuous technological advances in wireless communication and new wireless technologies becoming standardized at a fast rate, we can expect an increased interest for wireless networks, such as ad hoc and mesh networks. These networks operate in a distributed manner, independent of any centralized device.
openaire   +1 more source

Socialist Entrepreneurship and Integrated Peasant Economy: Failed Collectivization in Yugoslavia (1949–1953)

open access: yesJournal of Agrarian Change, EarlyView.
ABSTRACT This article explores the specific features of collectivization in socialist Yugoslavia, focusing on Slovenia as one of its constituent republics. Through a bottom‐up approach, it examines selected cases from the countryside surrounding the Slovenian capital, Ljubljana, between 1949 and 1953.
Lev Centrih
wiley   +1 more source

The Kigali story, the Singapore model, and rights to the city

open access: yes
Journal of the Royal Anthropological Institute, EarlyView.
Michael M.J. Fischer
wiley   +1 more source

Reformulating the Critique of Human Capital Theory

open access: yesJournal of Economic Surveys, EarlyView.
ABSTRACT Despite criticism, human capital theory (HCT) has remained central for six decades to the teaching and practice of economics. This paper reformulates the critique of HCT, focusing on two aspects that are typically relegated to the margin.
Paul Auerbach, Francis Green
wiley   +1 more source

Remote Control and Monitoring of Smart Home Facilities via Smartphone with Wi-Fly [PDF]

open access: yes, 2015
Due to the widespread ownership of smartphone devices, the application of mobile technologies to enhance the monitoring and control of smart home facilities has attracted much academic attention.
Ghabar, Omar, Lu, Joan
core  

The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities

open access: yes, 2014
Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-
Bild, David R.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy